Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

Video/Webcast | Presented by Nutanix

Multi-Cloud Cost Optimization with Nutanix Beam

Many application and technology budget owners are surprised by the unexpectedly high costs of their cloud services. To prevent uncontrolled cloud spend and enable accurate resource planning, cloud teams need better visibility of service consumption across their multi-cloud environments.

Close Security Gap with Protection at the Software and Hardware Levels

As businesses pump money into software to cover the more headline-prone security breaches, hardware-level vulnerabilities are left largely unprotected. This White Paper examines the issue, as well as the technologies available — such as the HPE ProLiant DL380 Gen10 Server, powered by Intel® Xeon® Scalable processors — and how to choose the right partner to help close your security gap.

Video/Webcast | Presented by FireEye

Email Threat Landscape

One in every 101 emails are malicious. Keeping your emails safe means keeping your company safe. Watch this short video about the latest email attack tactics so you can protect the one that matters.

Miscellaneous | Presented by FireEye

All It Takes is ONE

Email is the most popular vector for cyber attacks. See recent findings from the analysis of over a half billion emails so you can better protect your organization.

White Paper | Presented by FireEye

Customer Story: Integrated Security

See how the city and county of San Francisco started with FireEye Network Security and soon adopted FireEye Email Security.

Miscellaneous | Presented by FireEye

Email Threat Report

- One in every 101 emails are malicious - Tax season sees an increase in attacks - Impersonation attacks are more commonly used For more information like this, read our free Email Threat Intelligence report which includes findings from analyzing over a half billion emails.

Miscellaneous | Presented by FireEye

The Path of an Email Attack

91% of cyber crime starts with an email. How confident are you in your email security solution? Check out this infographic to understand how an email attack unfolds, and the significant costs associated with an email breach.

White Paper | Presented by Logicalis

Accelerating Service Delivery with IT Automation

In this white paper, we outline a path for your IT organization to automate IT processes based on the native integration of VMware vRealize® Suite and its automation capabilities of VMware vRealize® Automation™ and network virtualization with VMware NSX®.

eBook | Presented by Microsoft

AI Basics for Business

You’ve probably heard artificial intelligence (AI) is the future of how business will get done. But do you realize that the opportunity for AI to change your business is happening right now? From creating powerful new customer experiences to optimizing your operations, AI can make your organization smarter and more efficient and help transform your business.

White Paper | Presented by Microsoft

AI in Retail: Transforming the marketplace

In any industry that provides a service, customer satisfaction is everything. But in a world where customers carry buying power in the palms of their hands and expect nothing less than personalized, fast, and seamless experiences, how we define satisfaction is rapidly evolving.

Load More